CN116723506A - Method, system and storage medium for authenticating sensitive information through 5G message - Google Patents
Method, system and storage medium for authenticating sensitive information through 5G message Download PDFInfo
- Publication number
- CN116723506A CN116723506A CN202211342483.4A CN202211342483A CN116723506A CN 116723506 A CN116723506 A CN 116723506A CN 202211342483 A CN202211342483 A CN 202211342483A CN 116723506 A CN116723506 A CN 116723506A
- Authority
- CN
- China
- Prior art keywords
- authentication
- message
- server
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000003068 static effect Effects 0.000 claims abstract description 19
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 230000007774 longterm Effects 0.000 claims description 3
- 230000006399 behavior Effects 0.000 abstract description 8
- 238000012544 monitoring process Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The application discloses a method for authenticating sensitive information through a 5G message, which utilizes the 5G message to transmit the sensitive information, authenticates the sensitive information in an operator authentication server and a third party authentication server, and comprises static information authentication, dynamic information authentication and remote authentication; the sensitive information does not flow into the service APP which initiates authentication, and the service APP only receives the authentication result. The application also discloses a system for authenticating the sensitive information through the 5G message, which comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server; static information authentication and dynamic information authentication are performed in an operator authentication server, and remote authentication is performed in a third party authentication server. The authentication process is very safe, and the service APP is prevented from stealing and monitoring sensitive information; when the business APP relates to economic behaviors such as loans, the application can judge whether the user is puttee or not through dynamic information authentication, thereby ensuring the personal safety of the user.
Description
Technical Field
The application relates to the field of mobile communication and information authentication, in particular to a method, a system and a storage medium for performing sensitive information authentication through a 5G message.
Background
Sensitive personal information includes biometric identification, religious beliefs, specific identities, medical health, financial accounts, track of whereabouts and personal information of minors less than fourteen years old, and once the sensitive personal information is revealed or illegally used, the sensitive personal information is liable to cause infringement of personality dignity of natural people or harm to personal and property safety. At present, mobile phone APP needs to perform sensitive personal information authentication under a large number of service scenes, if a user is required to shoot an identity card, the information on the front side and the back side of a bank card is uploaded, video information is collected to perform living examination, and the information is transmitted to a cloud APP server through the APP and then is transferred to a third party authentication server to perform authentication. But some APPs may save user sensitive personal information, even raw image, video, etc., for various purposes. An external hacker may steal the database by using the system vulnerability, and an internal employee may steal the database by using the management vulnerability and sell personal information of the user, so that the information of the user is revealed, and even serious problems such as fraud or illegal account opening of a bank card are caused.
Disclosure of Invention
Aiming at the defects in the prior art, the application provides a method, a system and a storage medium for authenticating sensitive information through a 5G message; all sensitive information is ensured not to flow into the APP, but to directly enter a highly-trusted operator authentication server through a 5G message, and under the permission of a user, whether the user behavior is abnormal or not is judged according to the dynamic data of the user as the basis of further authentication. Finally, the APP only needs to acquire an authentication result, and the follow-up service is guaranteed to be normally carried out.
In order to achieve the above purpose, the present application adopts the following technical scheme:
a method of sensitive information authentication via 5G messages, the method comprising the steps of:
s1: the APP server transmits the basic authentication information uploaded by the user to an authentication request interface of an operator authentication server, the authentication request interface checks whether the APP manufacturer and the operator have contracts, if so, the basic authentication information is transmitted to an authentication service module of the operator authentication server, and if not, the APP server returns information prompting errors;
s2: the authentication service module authenticates the basic authentication information, if the authentication is successful, the authentication service module constructs a 5G MAAP card message, an authentication request is sent to a 5G message server through a MAAP interface of an operator authentication server, and the 5G message server forwards the authentication request to a 5G message module of a user mobile phone to prompt the user to upload sensitive information for further authentication; if the authentication fails, the authentication service module informs the APP server of the authentication failure through the authentication request interface;
s3: the user uploads the sensitive information for further authentication to a 5G message server through a 5G message module of the mobile phone, and the 5G message server forwards the sensitive information to an authentication service module through a MAAP interface of an operator authentication server;
s4: the authentication service module judges whether remote authentication is needed according to the type of the authentication service, if not, the authentication service module carries out local authentication on an operator authentication server, and the authentication service module informs the authentication result to a user and a service APP; the authentication service module forwards the sensitive information to a third party authentication server for remote authentication, if necessary.
In order to optimize the technical scheme, the specific measures adopted further comprise:
further, in step S2, the basic authentication information includes a mobile phone number, a name and an incomplete identity card number, and the authentication service module performs authentication on the basic authentication information specifically as follows:
and the authentication service module invokes the user information from the user information database of the operator authentication server according to the mobile phone number of the user, and compares the name with the incomplete identity card number.
Further, in step S2, the sensitive information includes a photograph, a video, an identification card, a bank card, and a living body detection medium.
Further, in step S4, the local authentication includes the steps of:
s4.1: the authentication service module judges whether to perform static information authentication or dynamic information authentication according to the type of the authentication service; if static information authentication is performed, the step S4.2 is entered, and if dynamic information authentication is performed, the step S4.3 is entered;
s4.2: the authentication service module confirms the identity of the user through image and video inspection, the authentication service module forms a 5G message containing an authentication result, the 5G message is sent to a 5G message server through a MAAP interface, and the 5G message server forwards the 5G message containing the authentication result to a 5G message module on a mobile phone of the user; meanwhile, the authentication service module feeds an authentication result back to the APP server through the authentication request interface, and the APP server informs the service APP on the mobile phone of the user;
s4.3: the authentication service module generates a 5G MAAP card message, the 5G MAAP card message is sent to the 5G message server through the MAAP interface, the 5G message server forwards the 5G message to the 5G message module of the mobile phone, the user is inquired whether the operator is allowed to acquire the dynamic information of the user for security check, and the user sends the selection result to the authentication service module through the 5G message; if the user allows the operator to acquire the user dynamic information for security check, the step S4.4 is entered; if the user does not allow the operator to acquire the dynamic information of the user for security check, static information authentication is carried out;
s4.4: the authentication service module acquires user dynamic data from the user information database, judges whether the user behavior is abnormal, sends the result to the APP server through the authentication request interface, and the APP server feeds the result back to the service APP.
Further, in step S4, the remote authentication specifically includes:
the authentication service module forwards the sensitive information to a third party authentication server through a remote authentication interface of an operator authentication server, the third party authentication server authenticates the sensitive information, the result is fed back to the authentication service module through the remote authentication interface, the authentication service module feeds back the authentication result to an APP server through an authentication request interface, and the APP server informs a service APP on a mobile phone of a user.
The application also provides a system for authenticating the sensitive information through the 5G message, which comprises: the system comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server;
the 5G mobile phone comprises a service APP and a 5G message module, and the service APP and the 5G message module are completely isolated; the service APP is used for collecting the name, the mobile phone number and the incomplete identity card number of the user and initiating an authentication request to an operator authentication server; the 5G message module is used for receiving a request for collecting sensitive information issued by the operator authentication server, sending the sensitive information uploaded by the user to the 5G message server, analyzing the authentication result and displaying the result to the 5G mobile phone terminal user;
the 5G message server comprises a data forwarding module and a MAAP module; for the uplink 5G message, the data forwarding module forwards the 5G message sent by the 5G message module in the 5G mobile phone to the MAAP module, and the MAAP module sends the 5G message to the operator authentication server; for the downlink 5G message, the operator authentication server sends the downlink message to the MAAP module, and the MAAP module sends the downlink message to a 5G message module in the 5G mobile phone;
the operator authentication server comprises an authentication request interface, an authentication service module, a MAAP interface, a user information database and a remote authentication interface; the authentication request interface receives an authentication request and basic authentication information sent by the APP server, checks whether an APP manufacturer and an operator have contracts, informs the authentication server to perform basic information authentication, and receives an authentication result to return to the APP server; the MAAP interface interacts with a MAAP module of the 5G message server to send and receive the 5G message;
the remote authentication interface sends a remote authentication request to the third party authentication server, receives the result of the remote authentication and feeds back the result to the authentication service module.
In order to optimize the technical scheme, the specific measures adopted further comprise:
further, the user information database comprises network entry registration information and dynamic data; the network access registration information comprises a name, a gender, an identity card number and an identity card photo; the dynamic data comprise whether the mobile phone is started up suddenly in different places after long-term shutdown, a user history position track and the current registered base station position of the user mobile phone.
Further, the authentication service module judges whether static information authentication, dynamic information authentication or remote authentication is required according to the authentication service type; if static information authentication is required, the authentication service module invokes network registration information from a user information database according to the mobile phone number of the user, compares the network registration information with the name and the incomplete identity card number input by the user in the APP, fails authentication if the network registration information does not accord with the name and the incomplete identity card number, and requires the user to upload the identity card photo and the living body check media through a 5G message and check if the network registration information does not accord with the name and the incomplete identity card number; if the dynamic information authentication is required, the authentication service module judges whether the user behavior is abnormal according to the dynamic data in the user information database under the condition that the user is allowed, and feeds back the result to the APP server; and if the remote authentication is required, the authentication service module calls a third party authentication server through a remote authentication interface to perform the remote authentication.
The present application also proposes a computer-readable storage medium storing a computer program that causes a computer to perform the method of sensitive information authentication via 5G messages as described above.
The beneficial effects of the application are as follows:
(1) The APP initiating authentication needs to sign contract with the operator in advance, and sensitive information used for authentication only passes through the 5G network of the operator, so that the APP cannot acquire the sensitive information of the user, and the sensitive information is difficult to attack and steal;
(2) For APP developers, the development cost is lower; on the APP server side, a plurality of banks or public security systems and other systems do not need to be connected, a third party interface does not need to be purchased, integration is not needed, and an authentication result can be obtained only through a simple HTTP interface with an operator; for the APP side, an image and video acquisition function is not required to be integrated;
(3) For the authentication of economic behaviors such as loans, by combining dynamic information stored by operators, whether the user is likely to have the risk of being forced to authenticate by being kidnapped to a remote position or the possibility of being decoy to a marketing organization is judged, and whether the user behaviors are abnormal can be judged to a certain extent.
Drawings
FIG. 1 is an overall flow chart of the present authentication method;
FIG. 2 is a schematic diagram of a typical 5G MAAP card message;
FIG. 3a is a diagram of a user interaction interface when initiating authentication to a user;
FIG. 3b is a diagram of a user interface showing authentication results;
FIG. 4 is a remote authentication flow chart;
FIG. 5 is a dynamic information authentication flow chart;
FIG. 6 is a schematic diagram of the authentication system;
FIG. 7 is a schematic diagram of a business APP versus 5G message module;
FIG. 8 is a schematic diagram of an attacker stealing information;
FIG. 9 is a block diagram of a 5G message server;
fig. 10 is a block diagram of an operator authentication server.
Detailed Description
The application will now be described in further detail with reference to the accompanying drawings.
In one embodiment, the present application proposes a method for authenticating sensitive information through a 5G message, and the overall flowchart of the method is shown in fig. 1, specifically including the following steps:
step 1: the service APP initiates authentication to the user, and requires the user to input basic authentication information such as a name, a mobile phone number and an incomplete identity card number, for example, the first three digits and the last four digits, and then the basic authentication information is uploaded to the APP server.
Step 2: the APP server transmits the basic authentication information to an authentication request interface of an operator authentication server, the authentication request interface checks whether the APP manufacturer and the operator have contracts, if yes, the APP server transmits the basic authentication information to an authentication service module, and if not, an error prompt is directly returned to the APP server.
Step 3: the authentication service module acquires user static information according to the user mobile phone number, compares the user static information with user input information, and if the user static information is in accordance with the user input information, the authentication is successful, and the step 4 is entered; if the authentication fails, the APP server is notified of the authentication failure through the authentication request interface.
Step 4: the authentication service module constructs a 5G MAAP card message, which contains APP information for initiating authentication, and information which needs to be uploaded by a user, such as an identity card, a front photo and a back photo of a bank card, and living body detection media (turning, nodding, reading a certain string of numbers and the like), and the information reaches the 5G message module of the mobile phone of the user through a MAAP interface and a 5G message server.
A typical 5G MAAP card message is shown in fig. 2. The 5G message supports the downlink uploading of information such as characters, images, voice, video, geographic positions and the like, and provides a sufficient technical means for sensitive information authentication; the MAAP system of the 5G message is similar to an enterprise public number or an industrial short message, but the approval is more strict, and provides a highly safe number identification guarantee, each number is provided with a specific service by a chatbot of an enterprise, such as 10000 represents China telecom, 10086 represents China Mobile, the numbers cannot be imitated, and the 5G message sent to the numbers by a user cannot be easily intercepted and eavesdropped; the 5G message is used without additionally installing APP, so that convenience of use of a user is ensured; the user has highly-trusted basic authentication information in operators as a reference, so that real-name authentication service can be provided for various external APP; in addition, some user dynamic information, such as the number use time, whether the mobile phone using the number is not started for a long time, whether the mobile phone using the number is not moved for a long time, the current position of the user and the like can be used as a further credibility reference, and further integrity and safety basis are provided for more sensitive authentication, such as financial loan service, under the condition of user agreement.
In this embodiment, the user uses the number of the chinese telecommunication to select the chinese telecommunication as the embodiment of the real-name authentication.
The china telecom sends 5G message to the user, prompting the sample APP to delegate the china telecom to perform real name authentication, so that the user selects whether to accept or not, as shown in fig. 3 a.
Step 5: after reading the 5G MAAP card message, the user shoots sensitive information for further authentication according to the regulations.
Step 6: the sensitive information is sent to the authentication service module through the 5G message server and the MAAP interface.
Step 7: the authentication service module confirms the identity of the user through image and video inspection.
Step 8: the authentication service module forms a 5G message containing the authentication result, and sends the 5G message to the 5G message server through the MAAP interface, the 5G message server forwards the 5G message to the user mobile phone 5G message module, and the 5G message module displays the authentication result to the user through the mobile phone, as shown in fig. 3 b.
Step 9: the authentication service module sends the authentication result to the APP server through the authentication request interface, and the APP server sends the authentication result to the APP on the mobile phone of the user.
When the authentication business relates to a database of a bank or public security, a third party authentication server is required to be used for remote authentication; a flowchart of the remote authentication is shown in fig. 4.
In this embodiment, taking a bank server as a third party authentication server as an example, the specific steps of remote authentication are as follows:
step 1: the authentication service module identifies a bank name and a card number on the bank card;
step 2: the authentication service module sends the user name, the identity card number, the bank name and the bank card number to the remote authentication interface;
step 3: the remote authentication interface sends relevant information to an authentication server of a corresponding bank according to the name of the bank, namely, the third party authentication server in fig. 4 performs authentication;
step 4: the third party authentication server returns an authentication result to the remote authentication interface;
step 5: the remote authentication interface returns an authentication result to the authentication service module;
the subsequent flow is the same as the static information authentication flow.
When financial services such as loans are involved, dynamic information authentication is also required to be combined; the flow chart of dynamic information authentication is shown in fig. 5, and the specific steps are as follows:
step 1: the authentication service module generates a 5G MAAP card message, inquires whether a user allows an operator to acquire dynamic information of the user for security check, and then reaches a 5G message module on the 5G mobile phone through a MAAP interface and a 5G message server;
step 2: the user selects permission or rejection, generates a 5G message containing the selection result, and reaches the authentication service module through the MAAP interface; if the user does not agree, the dynamic information authentication fails, and step 3 and step 4 are skipped;
step 3: if the user agrees, acquiring user dynamic information from a user information database;
step 4: and the authentication service module analyzes the returned user dynamic information and judges whether the user behavior is abnormal or not.
The subsequent flow is the same as the static information authentication flow.
In another embodiment, the present application proposes a system corresponding to a method for authenticating sensitive information through a 5G message, the overall structure of the system is shown in fig. 6, and the system includes: the system comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server.
The 5G mobile phone comprises a service APP and a 5G message module, and the service APP and the 5G message module are completely isolated, as shown in fig. 7; the service APP is used for collecting the name, the mobile phone number and the incomplete identity card number of the user and initiating an authentication request to an operator authentication server; the 5G message module is used for receiving a request for collecting sensitive information issued by the operator authentication server, sending the sensitive information uploaded by the user to the 5G message server, analyzing the authentication result and displaying the result to the 5G mobile phone terminal user;
in the conventional authentication method, sensitive information flows into an APP database, and an external attacker can easily steal the sensitive information, as shown in fig. 8; in the authentication method, sensitive information of the user does not flow into the APP server, and the problem of information disclosure does not exist.
The structure of the 5G message server is shown in fig. 9, and comprises a data forwarding module and a MAAP module; the data forwarding module forwards the 5G message sent by the 5G message module to the MAAP module, and the MAAP module sends the 5G message to the operator authentication server.
The structure of the operator authentication server is shown in fig. 10, and includes an authentication request interface, an authentication service module, a MAAP interface, a user information database, and a remote authentication interface;
the authentication request interface receives an authentication request and basic authentication information sent by the APP server, checks whether an APP manufacturer and an operator have contracts, informs the authentication server to perform basic information authentication, and receives an authentication result to return to the APP server; the MAAP interface interacts with a MAAP module of the 5G message server to send and receive the 5G message;
the authentication service module judges whether static information authentication, dynamic information authentication or remote authentication is required according to the authentication service type; if static information authentication is required, the authentication service module invokes network registration information from a user information database according to the mobile phone number of the user, compares the network registration information with the name and the incomplete identity card number input by the user in the APP, fails authentication if the network registration information does not accord with the name and the incomplete identity card number, and requires the user to upload the identity card photo and the living body check media through a 5G message and check if the network registration information does not accord with the name and the incomplete identity card number; if the dynamic information authentication is required, the authentication service module judges whether the user behavior is abnormal according to the dynamic data in the user information database under the condition that the user is allowed, and feeds back the result to the APP server; if the remote authentication is needed, the authentication service module calls a third party authentication server through a remote authentication interface to carry out the remote authentication;
the user information database comprises network access registration information and dynamic data; the network access registration information comprises a name, a gender, an identity card number and an identity card photo; the dynamic data comprise whether the mobile phone is started up suddenly in different places after long-term shutdown, a user history position track and a current registered base station position of the user mobile phone;
the remote authentication interface sends a remote authentication request to the third party authentication server, receives the result of the remote authentication and feeds back the result to the authentication service module.
In another embodiment, the application proposes a computer-readable storage medium storing a computer program that causes a computer to perform the method of sensitive information authentication via 5G messages as described above.
In the disclosed embodiments, a computer storage medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The computer storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a computer storage medium would include one or more wire-based electrical connections, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above is only a preferred embodiment of the present application, and the protection scope of the present application is not limited to the above examples, and all technical solutions belonging to the concept of the present application belong to the protection scope of the present application. It should be noted that modifications and adaptations to the application without departing from the principles thereof are intended to be within the scope of the application as set forth in the following claims.
Claims (9)
1. A method for authenticating sensitive information via a 5G message, the method comprising the steps of:
s1: the APP server transmits the basic authentication information uploaded by the user to an authentication request interface of an operator authentication server, the authentication request interface checks whether the APP manufacturer and the operator have contracts, if so, the basic authentication information is transmitted to an authentication service module of the operator authentication server, and if not, the APP server returns information prompting errors;
s2: the authentication service module authenticates the basic authentication information, if the authentication is successful, the authentication service module constructs a 5G MAAP card message, an authentication request is sent to a 5G message server through a MAAP interface of an operator authentication server, and the 5G message server forwards the authentication request to a 5G message module of a user mobile phone to prompt the user to upload sensitive information for further authentication; if the authentication fails, the authentication service module informs the APP server of the authentication failure through the authentication request interface;
s3: the user uploads the sensitive information for further authentication to a 5G message server through a 5G message module of the mobile phone, and the 5G message server forwards the sensitive information to an authentication service module through a MAAP interface of an operator authentication server;
s4: the authentication service module judges whether remote authentication is needed according to the type of the authentication service, if not, the authentication service module carries out local authentication on an operator authentication server, and the authentication service module informs the authentication result to a user and a service APP; the authentication service module forwards the sensitive information to a third party authentication server for remote authentication, if necessary.
2. The method for sensitive information authentication via 5G messages as claimed in claim 1, wherein: in step S2, the basic authentication information includes a mobile phone number, a name and an incomplete identity card number, and the authentication service module authenticates the basic authentication information specifically as follows:
and the authentication service module invokes the user information from the user information database of the operator authentication server according to the mobile phone number of the user, and compares the name with the incomplete identity card number.
3. The method for sensitive information authentication via 5G messages as claimed in claim 1, wherein: in step S2, the sensitive information includes a photo, a video, an identification card, a bank card, and a living body detection medium.
4. The method for authenticating sensitive information via 5G messages according to claim 1, wherein in step S4, the local authentication comprises the steps of:
s4.1: the authentication service module judges whether to perform static information authentication or dynamic information authentication according to the type of the authentication service; if static information authentication is performed, the step S4.2 is entered, and if dynamic information authentication is performed, the step S4.3 is entered;
s4.2: the authentication service module confirms the identity of the user through image and video inspection, the authentication service module forms a 5G message containing an authentication result, the 5G message is sent to a 5G message server through a MAAP interface, and the 5G message server forwards the 5G message containing the authentication result to a 5G message module on a mobile phone of the user; meanwhile, the authentication service module feeds an authentication result back to the APP server through the authentication request interface, and the APP server informs the service APP on the mobile phone of the user;
s4.3: the authentication service module generates a 5G MAAP card message, the 5G MAAP card message is sent to the 5G message server through the MAAP interface, the 5G message server forwards the 5G message to the 5G message module of the mobile phone, the user is inquired whether the operator is allowed to acquire the dynamic information of the user for security check, and the user sends the selection result to the authentication service module through the 5G message; if the user allows the operator to acquire the user dynamic information for security check, the step S4.4 is entered; if the user does not allow the operator to acquire the dynamic information of the user for security check, static information authentication is carried out;
s4.4: the authentication service module acquires user dynamic data from the user information database, judges whether the user behavior is abnormal, sends the result to the APP server through the authentication request interface, and the APP server feeds the result back to the service APP.
5. The method for authenticating sensitive information via 5G messages according to claim 1, wherein in step S4, the remote authentication is specifically:
the authentication service module forwards the sensitive information to a third party authentication server through a remote authentication interface of an operator authentication server, the third party authentication server authenticates the sensitive information, the result is fed back to the authentication service module through the remote authentication interface, the authentication service module feeds back the authentication result to an APP server through an authentication request interface, and the APP server informs a service APP on a mobile phone of a user.
6. A system for sensitive information authentication via 5G messages, comprising: the system comprises a 5G mobile phone, an APP server, an operator authentication server, a 5G message server and a third party authentication server;
the 5G mobile phone comprises a service APP and a 5G message module, and the service APP and the 5G message module are completely isolated; the service APP is used for collecting the name, the mobile phone number and the incomplete identity card number of the user and initiating an authentication request to an operator authentication server; the 5G message module is used for receiving a request for collecting sensitive information issued by the operator authentication server, sending the sensitive information uploaded by the user to the 5G message server, analyzing the authentication result and displaying the result to the 5G mobile phone terminal user;
the 5G message server comprises a data forwarding module and a MAAP module; for the uplink 5G message, the data forwarding module forwards the 5G message sent by the 5G message module in the 5G mobile phone to the MAAP module, and the MAAP module sends the 5G message to the operator authentication server; for the downlink 5G message, the operator authentication server sends the downlink message to the MAAP module, and the MAAP module sends the downlink message to a 5G message module in the 5G mobile phone;
the operator authentication server comprises an authentication request interface, an authentication service module, a MAAP interface, a user information database and a remote authentication interface; the authentication request interface receives an authentication request and basic authentication information sent by the APP server, checks whether an APP manufacturer and an operator have contracts, informs the authentication server to perform basic information authentication, and receives an authentication result to return to the APP server; the MAAP interface interacts with a MAAP module of the 5G message server to send and receive the 5G message;
the remote authentication interface sends a remote authentication request to the third party authentication server, receives the result of the remote authentication and feeds back the result to the authentication service module.
7. The system for sensitive information authentication via 5G messages as recited in claim 6, wherein said user information database comprises network entry registration information and dynamic data; the network access registration information comprises a name, a gender, an identity card number and an identity card photo; the dynamic data comprise whether the mobile phone is started up suddenly in different places after long-term shutdown, a user history position track and the current registered base station position of the user mobile phone.
8. The system for performing sensitive information authentication through 5G messages according to claim 6, wherein the authentication service module determines whether static information authentication, dynamic information authentication or remote authentication is required according to an authentication service type; if static information authentication is required, the authentication service module invokes network registration information from a user information database according to the mobile phone number of the user, compares the network registration information with the name and the incomplete identity card number input by the user in the APP, fails authentication if the network registration information does not accord with the name and the incomplete identity card number, and requires the user to upload the identity card photo and the living body check media through a 5G message and check if the network registration information does not accord with the name and the incomplete identity card number; if the dynamic information authentication is required, the authentication service module judges whether the user behavior is abnormal according to the dynamic data in the user information database under the condition that the user is allowed, and feeds back the result to the APP server; and if the remote authentication is required, the authentication service module calls a third party authentication server through a remote authentication interface to perform the remote authentication.
9. A computer-readable storage medium, characterized by: a computer program is stored which causes a computer to perform the method of sensitive information authentication by means of a 5G message as claimed in any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211342483.4A CN116723506A (en) | 2022-10-31 | 2022-10-31 | Method, system and storage medium for authenticating sensitive information through 5G message |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211342483.4A CN116723506A (en) | 2022-10-31 | 2022-10-31 | Method, system and storage medium for authenticating sensitive information through 5G message |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116723506A true CN116723506A (en) | 2023-09-08 |
Family
ID=87866613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211342483.4A Pending CN116723506A (en) | 2022-10-31 | 2022-10-31 | Method, system and storage medium for authenticating sensitive information through 5G message |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116723506A (en) |
-
2022
- 2022-10-31 CN CN202211342483.4A patent/CN116723506A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11563734B2 (en) | System and method for authenticating called parties of individuals within a controlled environment | |
US10674009B1 (en) | Validating automatic number identification data | |
US12081975B2 (en) | Intelligent method for SIM-swap fraud detection and prevention | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
CN109784031B (en) | Account identity verification processing method and device | |
CN107729727B (en) | Real-name authentication method and device for account | |
US9256724B2 (en) | Method and system for authorizing an action at a site | |
WO2013135898A1 (en) | Mobile phone takeover protection system and method | |
WO2012005653A1 (en) | Secure user identification | |
CN110598383B (en) | Method and device for removing account authority limit | |
US20190026446A1 (en) | Method and system for creating a strong authentication for a user using a portable electronic device | |
US20210406909A1 (en) | Authorizing transactions using negative pin messages | |
CN107241362B (en) | Method and device for identifying identity of verification code input user | |
KR102151430B1 (en) | Computing device for executing smart contact center service | |
CN107294981B (en) | Authentication method and equipment | |
US12052239B2 (en) | Systems and methods for authenticating of personal communications cross reference to related applications | |
CN116723506A (en) | Method, system and storage medium for authenticating sensitive information through 5G message | |
US20160342996A1 (en) | Two-factor authentication method | |
US10853816B1 (en) | Systems and methods for authentication of an individual on a communications device | |
CN114710328A (en) | Identity recognition processing method and device | |
CN107241318B (en) | Account loss reporting method and device | |
US20190208410A1 (en) | Systems, devices, and methods for managing communications of one or more computing devices | |
KR20240126081A (en) | System of monitoring voice phishing using call data and method thereof | |
KR20240010122A (en) | Method for providing secure identity verification service | |
CN114095230A (en) | Data processing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |